As in war, so in cyber defense and attack: legacy deception techniques still in use. Here we look back at the various techniques used by the “good guys” The IT department defends its network or the rogue bad guys trying to get in and steal information. Read CSO’s full story here. The U.S. DefenseImagery.com will feature iReporter photos in this week’s edition of the weekly Newsquiz.com/Gallery. Back to the page you came from.”]

